Symantec research finds IoT devices used to launch attacks

Symantec Corp., a global leader in cybersecurity, recently revealed new research showing how cybercriminal networks are taking advantage of lax internet of things (IoT) device security to spread malware and create zombie networks, or botnets, without the device owners knowing.

Symantec’s security-response team has discovered that cybercriminals are hijacking home networks and everyday consumer connected devices to help carry out distributed denial-of-service (DDoS) attacks against more profitable targets, usually large companies.

To succeed, they need cheap bandwidth, and they get it by stitching together a large web of consumer devices that are easy to infect, because they lack sophisticated security.

More than half of all IoT attacks originate from China and the United States, based on the location of internet protocol (IP) addresses used to launch malware attacks. High numbers of attacks are also coming from Russia, Germany, the Netherlands, Ukraine ,and Vietnam. In some cases, IP addresses may be proxies used by attackers to hide their true location.

Most IoT malware targets non-personal-computer embedded devices, such as web servers, routers, modems, network-attached storage (NAS) devices, closed-circuit television (CCTV) systems, and industrial control systems. Many are internet-accessible, but because of their operating system and processing-power limitations, they may not include any advanced security features.

As attackers are now highly aware of insufficient IoT security, many pre-program their malware with commonly used and default passwords, allowing them to easily hijack IoT devices. Poor security on many IoT devices makes them easy targets, and often victims may not even know they have been infected.

Additional findings from Symantec’s research include:

2015 was a record year for IoT attacks, with plenty of speculation about the possible hijacking of home automation and home security devices. However, attacks to date have shown that attackers tend to be less interested in the victim, and the majority wish to hijack a device to add it to a botnet, most of which are used to perform DDoS attacks.

IoT devices are primary targets, since they are designed to be plugged in and forgotten after basic setup.

The most common passwords that IoT malware used to attempt to log into devices was, unsurprisingly, the combination of “root” and “admin”, indicating that default passwords are frequently never changed.

Attacks originating from multiple IoT platforms simultaneously may be seen more often in the future, as the amount of the embedded devices connected to the internet rises.

For more information on Symantec’s IoT research, visit www.symantec.com/connect/blogs/iot-devices-being-increasingly-used-ddos-attacks

Leave a Reply

Your email address will not be published. Required fields are marked *